Recent Blogs
This year at Microsoft Ignite, Microsoft Defender is announcing exciting innovations for endpoint protection that help security teams deploy faster, gain more visibility, and proactively block attack...
Nov 18, 20254.1KViews
0likes
2Comments
Root detection is a critical security control that identifies whether an Android device has been compromised to gain elevated privileges or unrestricted access to the operating system. When a device ...
Nov 17, 2025352Views
1like
0Comments
As of today, October 14, 2025, Microsoft is officially ending support for Windows 10. This means that Windows 10 devices will no longer receive security or feature updates, nor technical support from...
Oct 14, 20254.6KViews
2likes
1Comment
We’re excited to announce a key milestone in Defender’s multi-tenant management journey—Microsoft Defender for Endpoint security policies can now be distributed across multiple tenants from the Defen...
Aug 07, 20252KViews
3likes
0Comments
Network isolation refers to how Microsoft Defender for Endpoint restricts a compromised device’s communication within the network in order to contain threats and prevent lateral movement. But oftenti...
Jun 25, 20251.2KViews
1like
0Comments
Microsoft has a long-standing relationship with MITRE and holds deep respect for the unique role that the organization plays within the security ecosystem. MITRE ATT&CK® Evaluations have been instru...
Jun 13, 20253KViews
2likes
0Comments
3 MIN READ
Enhancing macOS security with behavior monitoring
As attackers become more sophisticated in today’s rapidly evolving threat landscape, security strategies must continue to innovate to keep pace. F...
Jun 10, 20252.5KViews
0likes
0Comments
Create and manage global exclusions for Linux
Global exclusions for Microsoft Defender for Endpoint on Linux are now generally available. This will allow security teams to create and manage exclus...
Jun 05, 20251.3KViews
4likes
1Comment
6 MIN READ
Protecting critical assets
Traditional security solutions often operate in a one-size-fits-all alert model that treats every detection equally, regardless of how important the asset is. But not al...
May 27, 20252.7KViews
1like
0Comments
The rise of tampering attacks
In cybersecurity, anti-tampering protection refers to the defensive measures designed to prevent unauthorized modifications to security systems, policies, and settings...
May 15, 20252.4KViews
1like
1Comment
Resources
Tags
- microsoft defender for endpoint48 Topics
- Advanced hunting20 Topics
- macos15 Topics
- linux13 Topics
- Mobile Threat Defense9 Topics
- android8 Topics
- EDR7 Topics
- Backward support6 Topics
- webinar5 Topics
- apis5 Topics